Screenshot forensics
One of the interesting thing I like to do when reading (security) blog
posts, is to try to deduce details about the machine setup used. You can
find some very interesting tidbits of information, like Sunbelt using
Symantec AV on some of their
machines.
A couple of current examples:
more ...